Abstract
This is really just very preliminary research around delegation, and in the context of the Pico Project it’s all about replacing passwords.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
At this point, the majority of the audience raised their hands.
- 2.
“SMAPs: Short Message Authentication Protocols”, these proceedings.
- 3.
See Helen Nissenbaum, 2001, “Securing trust online: wisdom or oxymoron?” Boston University Law Review, 81(3), pp. 635–664.
- 4.
Editor’s Note: Although a user who relies on Pico tamper-evidence to protect against password theft is motivated not to extract their own passwords from the Pico.
- 5.
EasyChair is a conference management application: http://easychair.org/.
- 6.
See for example Michael Roe, 2010, Cryptography and evidence, http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-780.pdf.
References
Bauer, L., Cranor, L.F., Reiter, M.K., Vaniea, K.: Lessons learned from the deployment of a smartphone-based access-control system. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, pp. 64–75. ACM (2007)
Duffy, J.: Tips for sharing passwords. PC Magazine, September 2014. http://uk.pcmag.com/password-managers-products/35518/feature/tips-for-sharing-passwords
Paul Cruickshank, A.C., Pearson, M.: British police tricked terror suspect into handing over phone, source says. CNN, April 2016. http://edition.cnn.com/2016/04/01/europe/uk-isis-terror-convictions/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Llewellyn-Jones, D. (2017). Explicit Delegation Using Configurable Cookies (Transcript of Discussion). In: Anderson, J., Matyáš, V., Christianson, B., Stajano, F. (eds) Security Protocols XXIV. Security Protocols 2016. Lecture Notes in Computer Science(), vol 10368. Springer, Cham. https://doi.org/10.1007/978-3-319-62033-6_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-62033-6_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-62032-9
Online ISBN: 978-3-319-62033-6
eBook Packages: Computer ScienceComputer Science (R0)